ISACA Cybersecurity Audit Certificate ISACA Cybersecurity Audit Certificate Exam Online Training
ISACA Cybersecurity Audit Certificate Online Training
The questions for Cybersecurity Audit Certificate were last updated at Nov 26,2024.
- Exam Code: Cybersecurity Audit Certificate
- Exam Name: ISACA Cybersecurity Audit Certificate Exam
- Certification Provider: ISACA
- Latest update: Nov 26,2024
Using digital evidence to provide validation that an attack has actually occurred is an example of;
- A . computer forensic
- B . extraction.
- C . identification.
- D . data acquisition.
What is the FIRST activity associated with a successful cyber attack?
- A . Exploitation
- B . Reconnaissance
- C . Maintaining a presence
- D . Creating attack tools
Which of the following BEST facilitates the development of metrics for repotting to senior management on vulnerability management efforts?
- A . Reviewing business impact analysis (BIA) results
- B . Regularly benchmarking the number of new vulnerabilities identified with industry peers
- C . Tracking vulnerabilities and the remediation efforts to mitigate them
- D . Monitoring the frequency of vulnerability assessments using automated scans
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
- A . Privileged users
- B . Database administrators
- C . Terminated employees
- D . Contractors
What is the MAIN consideration when storing backup files?
- A . Utilizing solid slate device (SSDJ media for quick recovery
- B . Storing backup files on public cloud storage
- C . Protecting the off-site data backup copies from unauthorized access
- D . Storing copies on-site for ease of access during incident response
Which of the following is the SLOWEST method of restoring data from backup media?
- A . Monthly backup
- B . Full backup
- C . Differential Backup
- D . Incremental backup
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
- A . Budget for additional storage hardware
- B . Budget for additional technical resources
- C . Top management support
- D . Surplus processing capacity
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
- A . Cross-site scripting vulnerability
- B . SQL injection vulnerability
- C . Memory leakage vulnerability
- D . Zero-day vulnerability
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
- A . Attack
- B . Payload
- C . Vulnerability
- D . Target
In public key cryptography, digital signatures are primarily used to;
- A . ensure message integrity.
- B . ensure message accuracy.
- C . prove sender authenticity.
- D . maintain confidentiality.